September 21, 2018 | Russ Spitler

Forrester Says that AlienVault “Challenges” Enterprise SIEM vendors

Forrester just released their “Security Analytics Wave” report that evaluates Security Analytics/SIEM technologies used by large enterprises (5000+ employees).  I am super excited that AlienVault was included for the first time and placed as a “Challenger”. This is quite incredible if you think about it. To include AlienVault as a challenger in a group of…

September 21, 2018 | Javvad Malik

Things I Hearted this Week, 21st Sept 2018

Next week I’ll be flying out to Dallas, Texas to attend the AT&T Business Summit. I’ve never been to Dallas before, so hope to check out the sites and maybe even find out who did shoot JR (if you’re born after 1983 that reference probably means nothing to you).Do Breaches Affect Stock…

Get the latest security news in your inbox.

Subscribe via Email

September 20, 2018 | Kate Brew

Security Risks of Removable Media - Naughty USBs

Carrying on with National Security Cybersecurity Awareness Month (NSCAM), we continue our celebratory blog series. This one is on the dangers the Universal Serial Bus (USB) and other removable media. USBs are called all kinds of things, from thumb drives to memory sticks to USB flash drives.USB’s sure are convenient. They’re tiny and you can…

September 18, 2018 | Chuck Brooks

AI and ML; Key Tools in Emerging Cybersecurity Strategy and Investment

Recently, the Defense Advanced Research Project Agency (DARPA) announced a multi-year investment of more than $2 billion in new and existing programs in artificial intelligence called the “AI Next campaign. Agency director, Dr. Steven Walker, explained the implications of the initiative: “we want to explore how machines can acquire human-like communication and reasoning capabilities, with the ability to…

September 17, 2018 | John Alves

People and Passwords

In today's world, the Internet is a vast place filled with websites, services, and other content. Most content along with computers and other technology requires a password. The number of passwords a person has to know continues to grow. While it’s safe to say we use passwords to keep our accounts confidential, they can also be…

September 14, 2018 | Javvad Malik

Things I Hearted this Week, 14th September 2018

With everything that keeps going on in the world of security, and the world at large, most eyes were focused on Tim Cook as he and his merry men took to the stage and announce the latest and greatest in Apple technology.There didn’t seem to be anything totally mind-blowing on the phone end. Just looked to be…

September 11, 2018 | Danielle Russell

Explain Cryptojacking to Me

Last year, I wrote that ransomware was the summer anthem of 2017. At the time, it seemed impossible that the onslaught of global ransomware attacks like WannaCry and NotPetya would ever wane. But, I should have known better. Every summertime anthem eventually gets overplayed.This year, cryptojacking took over the airwaves, fueled by volatile global cryptocurrency markets. In the first half…

September 10, 2018 | Pam

VLAN Hopping and Mitigation

We’ll start with a few concepts:VLANA VLAN is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices. Security is one of the many reasons…

September 7, 2018 | Javvad Malik

Things I Hearted this Week, 7th Sept 2018

Welcome to another week of security goodness. I think we’re in that weird part of the year where most summer holidays are coming to a close, so people are opening their inboxes - saying NOPE - and shutting them back down again. Or maybe that’s just me. Although I am glad that the kids are finally…

September 6, 2018 | Javier Ruiz

Malware Analysis using Osquery Part 2

In the first part of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In that post, we followed the activity of the known Emotet loader, popular for distributing banking trojans. Using Osquery, we were able to discover how it infects a system using a malicious Microsoft Office document…

September 5, 2018 | Charles Humphrey

Malware Analysis for Threat Hunting

If you're not into Wireshark, procmon and Windows Sysinternals you might be in the wrong place :) Malware analysis allows the analyst to see what actions are taken and allows us to use those actions to build a profile that can be used to detect and block further infections and find related infections.  We run the malware…

September 4, 2018 | Javvad Malik

Cyber Security Awareness Month - Phishing

It’s September, which means it’s almost October, which is National Cyber Security Awareness Month (NCSAM)!NCSAM was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004. This government and industry collaboration was started with the intention to ensure citizens and companies of all sizes have access to resources…

Watch a Demo ›
GET PRICE FREE TRIAL CHAT